LocalAI path traversal vulnerability
High severity
GitHub Reviewed
Published
Jun 20, 2024
to the GitHub Advisory Database
•
Updated Aug 7, 2024
Description
Published by the National Vulnerability Database
Jun 20, 2024
Published to the GitHub Advisory Database
Jun 20, 2024
Reviewed
Jun 20, 2024
Last updated
Aug 7, 2024
A path traversal vulnerability exists in mudler/localai version 2.14.0, where an attacker can exploit the
model
parameter during the model deletion process to delete arbitrary files. Specifically, by crafting a request with a manipulatedmodel
parameter, an attacker can traverse the directory structure and target files outside of the intended directory, leading to the deletion of sensitive data. This vulnerability is due to insufficient input validation and sanitization of themodel
parameter.References